Way to identify B, C, F attack and prevent its occurrence, this is what it covers next

Talks about crack size → read once

Our attack model is based on excluding such non-representing records